Rapid7 Vulnerability & Exploit Database

RHSA-2013:1062: php53 security update

RHSA-2013:1062: php53 security update

Severity

7

CVSS

(AV:N/AC:M/Au:N/C:P/I:P/A:P)

Published

07/13/2013

Created

07/25/2018

Added

07/16/2013

Modified

07/04/2017

Description

PHP is an HTML-embedded scripting language commonly used with the ApacheHTTP Server.A buffer overflow flaw was found in the way PHP parsed deeply nested XMLdocuments. If a PHP application used the xml_parse_into_struct() functionto parse untrusted XML content, an attacker able to supplyspecially-crafted XML could use this flaw to crash the application or,possibly, execute arbitrary code with the privileges of the user runningthe PHP interpreter. (CVE-2013-4113)All php53 users should upgrade to these updated packages, which contain abackported patch to resolve this issue. After installing the updatedpackages, the httpd daemon must be restarted for the update to take effect.

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.